咨询与建议

限定检索结果

文献类型

  • 27,750 篇 期刊文献
  • 2,360 篇 会议
  • 2 册 图书

馆藏范围

  • 30,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,923 篇 工学
    • 8,892 篇 计算机科学与技术...
    • 4,627 篇 软件工程
    • 3,489 篇 机械工程
    • 3,356 篇 控制科学与工程
    • 3,140 篇 电子科学与技术(可...
    • 2,439 篇 仪器科学与技术
    • 2,139 篇 网络空间安全
    • 1,935 篇 信息与通信工程
    • 1,240 篇 材料科学与工程(可...
    • 832 篇 电气工程
    • 700 篇 光学工程
    • 591 篇 化学工程与技术
    • 473 篇 交通运输工程
    • 440 篇 航空宇航科学与技...
    • 432 篇 动力工程及工程热...
    • 302 篇 建筑学
  • 6,413 篇 理学
    • 2,852 篇 数学
    • 1,473 篇 物理学
    • 774 篇 系统科学
    • 400 篇 生物学
    • 346 篇 化学
  • 4,765 篇 管理学
    • 4,204 篇 管理科学与工程(可...
    • 341 篇 公共管理
  • 2,263 篇 医学
    • 1,709 篇 临床医学
  • 937 篇 经济学
    • 874 篇 应用经济学
  • 718 篇 农学
  • 615 篇 法学
    • 294 篇 社会学
  • 599 篇 军事学
    • 577 篇 军队指挥学
  • 514 篇 教育学
    • 447 篇 教育学
  • 422 篇 文学
    • 299 篇 外国语言文学
  • 421 篇 艺术学
    • 385 篇 设计学(可授艺术学...
  • 35 篇 哲学
  • 32 篇 历史学

主题

  • 844 篇 deep learning
  • 552 篇 security
  • 492 篇 machine learning
  • 273 篇 blockchain
  • 231 篇 internet of thin...
  • 211 篇 network
  • 156 篇 analysis
  • 151 篇 artificial intel...
  • 144 篇 covid-19
  • 139 篇 clustering
  • 135 篇 computer
  • 133 篇 simulation
  • 130 篇 detection
  • 129 篇 cloud computing
  • 126 篇 optimization
  • 125 篇 computer simulat...
  • 123 篇 system
  • 105 篇 intrusion detect...
  • 104 篇 reinforcement le...
  • 98 篇 data

机构

  • 122 篇 ieee
  • 112 篇 university of ch...
  • 96 篇 school of comput...
  • 70 篇 school of comput...
  • 57 篇 school of comput...
  • 54 篇 school of comput...
  • 40 篇 college of compu...
  • 36 篇 school of comput...
  • 32 篇 school of automa...
  • 29 篇 department of co...
  • 29 篇 school of contro...
  • 29 篇 state key labora...
  • 28 篇 school of cyber ...
  • 27 篇 school of comput...
  • 27 篇 school of contro...
  • 25 篇 school of mathem...
  • 25 篇 school of inform...
  • 25 篇 school of comput...
  • 24 篇 school of comput...
  • 23 篇 school of comput...

作者

  • 60 篇 lei wang
  • 43 篇 li li
  • 40 篇 jian wang
  • 38 篇 jing zhang
  • 38 篇 xin liu
  • 37 篇 qi liu
  • 37 篇 chao wang
  • 35 篇 jun zhang
  • 32 篇 jun wang
  • 31 篇 rui wang
  • 31 篇 cheng-wei qiu
  • 29 篇 meng wang
  • 29 篇 li yang
  • 27 篇 yu wang
  • 27 篇 wei li
  • 26 篇 xi chen
  • 26 篇 bin wang
  • 26 篇 li zhang
  • 25 篇 wei wang
  • 24 篇 wei he

语言

  • 27,672 篇 英文
  • 2,440 篇 中文
检索条件"机构=School of Computer and Cyberspace Security"
30112 条 记 录,以下是1-10 订阅
排序:
An efficient quantum proactive incremental learning algorithm
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2025年 第1期Mechanics & Astronomy) .卷 49-57页
作者: Lingxiao Li Jing Li Yanqi Song Sujuan Qin Qiaoyan Wen Fei Gao State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications school of cyberspace security Beijing University of Posts and Telecommunications
In scenarios where a large amount of data needs to be learned, incremental learning can make full use of old knowledge, significantly reduce the computational cost of the overall learning process, and maintain high pe...
来源: 同方期刊数据库 同方期刊数据库 评论
Secure DRM Scheme Based on Blockchain with High Credibility
收藏 引用
Chinese Journal of Electronics 2018年 第5期27卷 1025-1036页
作者: MA Zhaofeng HUANG Weihua GAO Hongmin school of cyberspace security Beijing University of Posts and Telecommunications
Upon the fairness, security and flexibility problems of traditional digital rights management, we proposed a blockchain infrastructure service based DRM platform with high-level credit and security, in which we first ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
CPSec DLP: Kernel-Level Content Protection security System of Data Leakage Prevention
收藏 引用
Chinese Journal of Electronics 2017年 第4期26卷 827-836页
作者: MA Zhaofeng school of cyberspace security Beijing University of Posts and Telecommunications
Data leakage prevention(DLP) is very important for sensitive or unauthorized data protection, however, most current DLP technologies are based on content monitor, detection and filtering, which can be easily bypassed ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Generalized Information security Model SOCMD for CMD Systems
收藏 引用
Chinese Journal of Electronics 2020年 第3期29卷 417-426页
作者: ZHANG Baowen CHANG Xiao LI Jianhua school of cyberspace security Technology and Research Shanghai Jiaotong University
As a new security defense theory, cyberspace mimic defense(CMD) provides an architecture named Dynamic heterogeneous redundancy(DHR) to enhance the defense level of system security. Due to the new dynamic defense mech... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Certificateless threshold signature from lattice
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 965-972页
作者: Huifang Yu Qi Zhang school of cyberspace security Xi'an University of Posts and TelecommunicationsXi'anChina
Threshold signature has been widely used in electronic wills,electronic elections,cloud computing,secure multiparty computation and other *** now,certificateless threshold signature schemes are all based on traditiona... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis on ‘an arbitrated quantum signature protocol based on the chained CNOT operations encryption’
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2019年 第3期26卷 73-80页
作者: Wen Kai Zheng Shihui Sun Bin school of cyberspace security Beijing University of Posts and Telecommunications
Arbitrated quantum signature(AQS) is an important branch in quantum cryptography to authenticate quantum information, and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS. Recently, it is d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
PROBABILISTIC AND AVERAGE LINEAR WIDTHS OF SOBOLEV SPACE WITH GAUSSIAN MEASURE IN SPACE S_Q(T)(1≤Q≤∞)
收藏 引用
Acta Mathematica Scientia 2015年 第2期35卷 495-507页
作者: 徐艳艳 陈广贵 甘莹 许燕 Lab of security Insurance of cyberspace of Sichuan Province School of Mathematics and Computer EngineeringXihua University school of Mathematics and computer Engineering Xihua University
Probabilistic linear (N, δ)-widths and p-average linear N-widths of Sobolev space W2^r(T), equipped with a Gaussian probability measure #, are studied in the metric of Sq (T) (1 ≤ Q ≤∞), and determined the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Congruent Feature Selection Method to Improve the Efficacy of Machine Learning-Based Classification in Medical Image Processing
收藏 引用
computer Modeling in Engineering & Sciences 2025年 第1期142卷 357-384页
作者: Mohd Anjum Naoufel Kraiem Hong Min Ashit Kumar Dutta Yousef Ibrahim Daradkeh Department of computer Engineering Aligarh Muslim UniversityAligarh202002India College of computer Science King Khalid UniversityAbha61413Saudi Arabia school of Computing Gachon UniversitySeongnam13120Republic of Korea Department of computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of computer Engineering and Information College of Engineering in Wadi AlddawasirPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
Machine learning(ML)is increasingly applied for medical image processing with appropriate learning *** applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify specific flaws... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Divisor Class Halving Algorithms for Genus Three Hyperelliptic Curves
收藏 引用
Chinese Journal of Electronics 2020年 第1期29卷 97-105页
作者: YOU Lin YANG Yilin GAO Shuhong school of cyberspace security Hangzhou Dianzi University school of Mathematical and Statistical Sciences Clemson University
In an(hyper)elliptic curve cryptosystem,the most important operation or the most time-consuming operation is the divisor scalar multiplication which consists of a sequence of doubling(of divisor) and addition(of two d... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Sparse signal reconstruction via generalized two-stage thresholding
收藏 引用
Science China(Information Sciences) 2022年 第3期65卷 288-289页
作者: Heping SONG Zehong AI Yuping LAI Hongying MENG Qirong MAO school of computer Science and Telecommunications Engineering Jiangsu University Jiangsu Key Laboratory of security Technology for Industrial cyberspace Jiangsu University school of cyberspace security Beijing University of Posts and Telecommunications Department of Electronic & computer Engineering Brunel University London
Dear editor,The sparse representation model has received a great amount of attention in various signal and image processing applications. Compressed sensing(CS) [1] has consistently focused on devising sparse represen... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论